Skip Navigation

Posts
0
Comments
192
Joined
3 yr. ago

  • Not the original question, but if you have just a normal "Nest Thermostat" (Not learning or E) it has matter support and you can add it over matter without paying $5

  • I can load a pirated copy onto a modded console, does that mean that Nintendo is liable for their software being used for piracy?

  • In America I just use my buddy Carl. He's also my doctor.

  • Damn, when you said remote died I thought you meant lost connection

  • A real answer to your question though, as long as you can get it to reconnect, even if you have to close the window first, it should still have your changes to the file ready to save. These will be cached (somewhere?) unless you close the file.

  • While the implementation of an A/B update system wouldn't be drag and drop from Android to a different OS, they absolutely could implement the same idea to prevent this issue.

    The likely reason as to why is storage space, you need two copies of the system, while only one is running at a time. They probably put as little space into these infotainment systems as possible.

    If they put more in new models, they'd then have to support two methods of updating the system. It's easier to tell the customer on the rare occasion that an error does happen "oops we made a fucky wucky it's on you to fix it"

  • LocalTuya on HACS, it's a bit of a pain to setup and requires you to make a tuya dev account (free) but as far as I can tell you can delete it after, it's just to get the security keys to actually control the devices, and then issue them locally. My devices were much more responsive after doing so

  • It's not "best practice", but a compromised key is a compromised key whether that key is used to connect 1 or 100 computers to a server. No, I can't shut off access to exactly one machine, I do not however have any difficulty in shutting off access to every machine and replacing it with a new key. Your system and my system are no different with a single compromised key.

    If I had 100 computers that I had to change identity files on each time it was compromised, and my keys were being compromised often, I would see a benefit from using multiple different keys.

    Quit acting like I've left the front door to my house open when the door is locked but my roommate and I share the same key.

  • Again, I know it's not amazing security but it's not inherently bad. The key (actually encrypted), if (not when) compromised would provide the same level of access to my system as having two keys with one compromised. Assuming I'm an all knowing wizard and can smell when a key is compromised, I can log in remotely and replace the old key with a freshly generated one. More likely however is that if anybody was going to actually do something with my compromised key, they'd clear my authorized_keys file and replace it with a key I don't have access to. Don't kid yourself into thinking having multiple keys suddenly makes you 10x more secure.

    What's more likely is someone finds my flashdrive on the ground, goes "oh boy free flashdrive full of Linux ISOs and recovery tools!" And proceeds to wipe it and use it for their own shit, while I regenerate a new key when I notice it missing.

  • I use the same identity file for all of my computers. I don't have password auth enabled on my server and it's an extreme inconvenience when I'm on a new machine and have to dig out a different machine to get a copy of my new key to the server. Best practice? Probably not, but I'd rather that than having password auth enabled. I keep an encrypted copy of my id_rsa on my thumb drive so I've always got it when I need it.

    I had never personally heard of ConnectBot, but it says last updated in February of this year on Google Play. I don't see a real reason to use it over Termux however.

  • Not exactly an advanced Linux user but what's the hate with systems?